How effective is Soft Systems Methodology as an alternative to the dominant and so-called ‘hard’ approaches to Information Systems
نویسنده
چکیده
Despite the myriad of information systems development methods that have surfaced over recent years, and the growing interest in the use of soft systems methodology (SSM), the realisation of computer-based information systems in realworld situations continues to be somewhat challenging. Against this background, this paper will aim to delve into such a methodology known as SSM, establish an understanding of what it is and its effectiveness compared to the alternative ‘hard’ approaches. In doing so, the advantages of the methodology and its problems will also be presented.
منابع مشابه
تئوری پیچیدگی و رویکرد کلاژیسم در سیستم های ژئومورفیک
Complexity Theory and Collagist Approach in Geomorphic Systems Introduction Now, scientists know the world as complex systems that predict consequences of it is so difficult. In this situation, the systems operated by rotation manner in which chaos is order and discipline leads to chaos. Nowadays, simple idea of how the world work change and convert to complex and paradoxical idea. This i...
متن کاملA Case for Open Network Health Systems: Systems as Networks in Public Mental Health
Increases in incidents involving so-called confused persons have brought attention to the potential costs of recent changes to public mental health (PMH) services in the Netherlands. Decentralized under the (Community) Participation Act (2014), local governments must find resources to compensate for reduced central funding to such services or “innovate.” But innovation, even when pressure for c...
متن کاملSoft Systems Methodology for Implementing Clinical Practice Guidelines in A General Hospital: A study protocol
Background: It is notoriously challenging to implement evidence-based care and to update and improve health care policy. Adhering to evidence-based Clinical Practice Guidelines (CPGs) serves as the driving force behind making decisions based on the best evidence and making efforts for improving the quality of patient care and outcomes. Despite requiring Iranian hospitals to implement CPGs in Ja...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کامل“Wood Already Touched by Fire is not Hard to Set Alight”; Comment on “Constraints to Applying Systems Thinking Concepts in Health Systems: A Regional Perspective from Surveying Stakeholders in Eastern Mediterranean Countries”
A major constraint to the application of any form of knowledge and principles is the awareness, understanding and acceptance of the knowledge and principles. Systems Thinking (ST) is a way of understanding and thinking about the nature of health systems and how to make and implement decisions within health systems to maximize desired and minimize undesired effects. A major constraint to applyi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003